{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T16:30:09Z","timestamp":1761323409072,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540333760"},{"type":"electronic","value":"9783540333777"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11734666_4","type":"book-chapter","created":{"date-parts":[[2006,3,9]],"date-time":"2006-03-09T12:10:32Z","timestamp":1141906232000},"page":"32-42","source":"Crossref","is-referenced-by-count":11,"title":["Forward Secure Communication in Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Sjouke","family":"Mauw","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ivo","family":"van Vessem","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bert","family":"Bos","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"4_CR1","first-page":"156","volume-title":"MobiHoc 2001: Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing","author":"S. Basagni","year":"2001","unstructured":"Basagni, S., Herrin, K., Bruschi, D., Rosti, E.: Secure pebblenets. In: MobiHoc 2001: Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, pp. 156\u2013163. ACM Press, New York (2001)"},{"key":"4_CR2","unstructured":"Bellare, M., Yee, B.: Forward-security in private-key cryptography. Cryptology ePrint Archive, Report 2001\/035 (2001)"},{"key":"4_CR3","first-page":"41","volume-title":"CCS 2002: Proceedings of the 9th ACM conference on Computer and communications security","author":"L. Eschenauer","year":"2002","unstructured":"Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: CCS 2002: Proceedings of the 9th ACM conference on Computer and communications security, pp. 41\u201347. ACM Press, New York (2002)"},{"key":"4_CR4","unstructured":"Gavidia, D., Voulgaris, S., van Steen, M.: Epidemic-style monitoring in large-scale sensor networks. Technical Report IR-CS-012.05, Vrije Universiteit Amsterdam (March 2005), http:\/\/www.cs.vu.nl\/pub\/papers\/globe\/IR-CS-012.05.pdf"},{"key":"4_CR5","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1145\/378993.379006","volume-title":"ASPLOS-IX: Proceedings of the ninth international conference on Architectural support for programming languages and operating systems","author":"J. Hill","year":"2000","unstructured":"Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D., Pister, K.: System architecture directions for networked sensors. In: ASPLOS-IX: Proceedings of the ninth international conference on Architectural support for programming languages and operating systems, pp. 93\u2013104. ACM Press, New York (2000), doi:10.1145\/378993.379006"},{"issue":"1","key":"4_CR6","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.adhoc.2003.09.009","volume":"3","author":"F. Hu","year":"2005","unstructured":"Hu, F., Sharma, N.: Security considerations in ad hoc sensor networks. Ad Hoc Networks\u00a03(1), 69\u201389 (2005)","journal-title":"Ad Hoc Networks"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Jamshaid, K., Schwiebert, L.: Seken (secure and efficient key exchange for sensor networks). In: Performance, Computing, and Communications, 2004 IEEE International Conference on, pp. 415\u2013422 (2004)","DOI":"10.1109\/PCCC.2004.1395047"},{"key":"4_CR8","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1145\/986655.986672","volume-title":"NSPW 2003: Proceedings of the 2003 workshop on New security paradigms","author":"K. Jones","year":"2003","unstructured":"Jones, K., Wadaa, A., Olariu, S., Wilson, L., Eltoweissy, M.: Towards a new paradigm for securing wireless sensor networks. In: NSPW 2003: Proceedings of the 2003 workshop on New security paradigms, pp. 115\u2013121. ACM Press, New York (2003)"},{"key":"4_CR9","first-page":"162","volume-title":"SenSys 2004: Proceedings of the 2nd international conference on Embedded networked sensor systems","author":"C. Karlof","year":"2004","unstructured":"Karlof, C., Sastry, N., Wagner, D.: Tinysec: a link layer security architecture for wireless sensor networks. In: SenSys 2004: Proceedings of the 2nd international conference on Embedded networked sensor systems, pp. 162\u2013175. ACM Press, New York (2004)"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Krawczyk, H., Bellare, M., Canetti, R.: HMAC: Keyed-Hashing for Message Authentication, February 1997. RFC (2104)","DOI":"10.17487\/rfc2104"},{"key":"4_CR11","unstructured":"Law, Y.W., Dulman, S., Etalle, S., Havinga, P.: Assessing security-critical energy-efficient sensor networks. Technical Report TR-CTIT-02-18, University of Twente, The Netherlands (July 2002), http:\/\/purl.org\/utwente\/\/38381"},{"issue":"1","key":"4_CR12","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/1053283.1053287","volume":"8","author":"D. Liu","year":"2005","unstructured":"Liu, D., Ning, P., Li, R.: Establishing pairwise keys in distributed sensor networks. ACM Trans. Inf. Syst. Secur.\u00a08(1), 41\u201377 (2005)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"4_CR13","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1996","unstructured":"Menezes, A.J., Vanstone, S.A., Van Oorschot, P.C.: Handbook of Applied Cryptography. CRC Press, Inc., Boca Raton (1996)"},{"key":"4_CR14","volume-title":"RFID Privacy Workshop","author":"M. Ohkubo","year":"2003","unstructured":"Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic approach to \u201cprivacy-friendly\u201d tags. In: RFID Privacy Workshop, MIT, Cambridge (2003)"},{"issue":"6","key":"4_CR15","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/990680.990707","volume":"47","author":"A. Perrig","year":"2004","unstructured":"Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commun. ACM\u00a047(6), 53\u201357 (2004)","journal-title":"Commun. ACM"},{"issue":"5","key":"4_CR16","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"A. Perrig","year":"2002","unstructured":"Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: Spins: security protocols for sensor networks. Wirel. Netw.\u00a08(5), 521\u2013534 (2002)","journal-title":"Wirel. Netw."},{"key":"4_CR17","unstructured":"Pirzada, A.A., McDonald, C.: Kerberos assisted authentication in mobile ad-hoc networks. In: CRPIT 2004: Proceedings of the 27th conference on Australasian computer science, Darlinghurst, Australia, pp. 41\u201346. Australian Computer Society, Inc. (2004)"},{"key":"4_CR18","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1145\/871506.871518","volume-title":"ISLPED 2003: Proceedings of the 2003 international symposium on Low power electronics and design","author":"N.R. Potlapally","year":"2003","unstructured":"Potlapally, N.R., Ravi, S., Raghunathan, A., Jha, N.K.: Analyzing the energy consumption of security protocols. In: Nachiketh, R. (ed.) ISLPED 2003: Proceedings of the 2003 international symposium on Low power electronics and design, pp. 30\u201335. ACM Press, New York (2003)"},{"key":"4_CR19","first-page":"188","volume-title":"CASES 2003: Proceedings of the 2003 international conference on Compilers, architecture and synthesis for embedded systems","author":"R. Venugopalan","year":"2003","unstructured":"Venugopalan, R., Ganesan, P., Peddabachagari, P., Dean, A., Mueller, F., Sichitiu, M.: Encryption overhead in embedded systems and sensor network nodes: modeling and analysis. In: CASES 2003: Proceedings of the 2003 international conference on Compilers, architecture and synthesis for embedded systems, pp. 188\u2013197. ACM Press, New York (2003)"},{"key":"4_CR20","unstructured":"Wang, X., Yin, Y.L., Yu, H.: Finding collisions in the full SHA-1. Technical report, Shandong University, Shandong, China (June 2005)"},{"issue":"1","key":"4_CR21","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1145\/974121.974124","volume":"33","author":"Y. Wang","year":"2004","unstructured":"Wang, Y.: Robust key establishment in sensor networks. SIGMOD Rec.\u00a033(1), 14\u201319 (2004)","journal-title":"SIGMOD Rec."}],"container-title":["Lecture Notes in Computer Science","Security in Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11734666_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T23:39:36Z","timestamp":1736293176000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11734666_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540333760","9783540333777"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/11734666_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}